A Distributed Multi-secret Sharing Scheme on the (t,n) Threshold

被引:0
|
作者
Chen, Guiqiang [1 ]
Wang, Huanwen [2 ]
Wang, Liqin [3 ]
Jin, Yue [3 ]
机构
[1] Hebei North Univ, Inst Informat Sci & Engn, Zhangjiakou, Peoples R China
[2] Zhangjiakou Vocat Coll Technol, Informat Engn, Zhangjiakou, Peoples R China
[3] Zhangjiakou Vocat Coll Technol, Dept Elect Engn, Zhangjiakou, Peoples R China
关键词
Multi-secret sharing; discrete logarithm; dynamic threshold; Lagrange interpolation formula;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the most present threshold multi-secret sharing scheme, there were some problems. For example, each participant's shadow was generated by the dealer, the fixed threshold, need of the secure channels, the fixed dealer or the secret center. To overcome these problems, a distributed multi-secret sharing scheme on the (t, n) threshold was proposed in this paper. This scheme has the following properties: 1) Each participant selects his shadow by himself; 2) There is no secure channel 3) There is no the fixed dealer, each participant may be dealer to distribute the multi-secret, and the multi-secret could be accomplished one time such as to distribute and to comeback and to update and to validate and so on operations;4) The participant could be dynamically added or deleted; 5) The efficient solutions against multiform cheating of any participant are proposed, therefore the proposed scheme has practicability and highly security.
引用
收藏
页码:358 / +
页数:2
相关论文
共 50 条
  • [1] A new (t, n)-threshold multi-secret sharing scheme
    Li, HX
    Cheng, CT
    Pang, LJ
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 421 - 426
  • [2] An efficient (t, n)-threshold multi-secret sharing scheme
    Shi Runhua
    Huang Liusheng
    Zhong Hong
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 580 - +
  • [3] A (t, n) multi-secret sharing scheme
    Yang, CC
    Chang, TY
    Hwang, MS
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 151 (02) : 483 - 490
  • [4] A scheme for threshold multi-secret sharing
    Chan, CW
    Chang, CC
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 1 - 14
  • [5] A threshold multi-secret sharing scheme
    Shi Runhua
    Huang Liusheng
    Luo yonglong
    Zhong Hong
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1705 - +
  • [6] A secure and efficient (t, n) threshold verifiable multi-secret sharing scheme
    Huang, MJ
    Zhang, JZ
    Xie, SC
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 532 - 537
  • [7] A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP
    Shi, Runhua
    Zhong, Hong
    Huang, Liusheng
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 2, PROCEEDINGS, 2007, : 9 - +
  • [8] A New (t, n) Multi-secret Sharing Scheme
    Tan, Xiao-qing
    Wang, Zhi-guo
    ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 861 - +
  • [9] A practical (t, n) multi-secret sharing scheme
    Chien, HY
    Jan, JK
    Tseng, YM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (12) : 2762 - 2765
  • [10] Verifiable threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Li, Hui-Xian
    Li, Zhi-Jie
    Wang, Yu-Min
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2008, 40 (09): : 1462 - 1465